# Tested on# Raspbian Wheezy version date: 2015-05-05# # This post builds a scrambled openvpn server on a Raspberry PI# from source code for openvpn 2.3.8 plus patch to add scramble functionality# To get it working, you need both sides patched, the server and the client# plus you need to add a scramble key to server and client scripts.# Below we will use the following password scramble key "test"# This password key must be the same in server and client openvpn scripts# i.e. scramble obfuscate test

# Now transfer client script raspberrypi.ovpn
# in $HOME/clientside/ to your client PC
# Due to permissions, I had to transfer it to C:\
# Then in windows, copy the file
# to C:\Program Files (x86)\OpenVPN\config

# add new text line into file /etc/rc.local# before ‘exit 0' to ensure the firewall rules are run at reboot or power up.
sudo nano /etc/rc.local

/usr/local/bin/firewall.sh

# reboot the pi
sudo reboot

# TIP: Check server can start ok
sudo /etc/init.d/openvpn restart

# TIP:Check tun0 interface started
ifconfig

# Connect VPN client from remote location# does not work when client and server are connected# to same router and you try external IP address.# If you want to do a local test at home# connect to local IP address of server e.g. 192.168.1.4# when you go to your remote location, connect to no-ip address or external static IP

I have a quick question on creating additional users…
I seem to be messing up on that part of creating additional users.
I notice that the shell script backups the ta.key and ca.crt
Do I have to get them re-created each time for each user?